mekhaleraj / Pentest_booksView external linksLinks
☆42Feb 14, 2019Updated 7 years ago
Alternatives and similar repositories for Pentest_books
Users that are interested in Pentest_books are comparing it to the libraries listed below
Sorting:
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- ☆11Aug 31, 2019Updated 6 years ago
- ☆22Nov 22, 2025Updated 2 months ago
- Converts Python3 .py files into .exe and makes it so the file can run on any environment without installing python3.☆11Jun 7, 2018Updated 7 years ago
- Assistant/watchdog for Counterstake Bridge https://counterstake.org☆13Dec 26, 2025Updated last month
- ☆11May 19, 2022Updated 3 years ago
- ☆10Oct 2, 2021Updated 4 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 2 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- ☆14Feb 1, 2023Updated 3 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- ☆11Nov 14, 2021Updated 4 years ago
- Biteasy Blockchain REST API☆18Mar 28, 2014Updated 11 years ago
- General-purpose implementations of ERC-792 Arbitrables.☆12Jun 21, 2024Updated last year
- Abstractions for iterating and mapping over struct fields☆17Jan 15, 2026Updated last month
- ☆11Jan 5, 2022Updated 4 years ago
- A dependency free native implementation of Ethereum crypto functions missing from WebCrypto.☆16Jan 21, 2026Updated 3 weeks ago
- Docker image for Apache Derby. This image is no longer mainained.☆10Dec 8, 2023Updated 2 years ago
- DEPRECATED: Merged with ethcore/parity☆11Jul 18, 2016Updated 9 years ago
- Example Optimized Gas ERC721 Minting Contract☆11Dec 28, 2021Updated 4 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 7 months ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- ☆15Nov 22, 2021Updated 4 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- Example project using all 3 currently available builders: Go, Rust, and Zig☆11Dec 15, 2024Updated last year
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- i'm looking. where are you?☆10Oct 27, 2018Updated 7 years ago
- Dot files and configuration files used on LadOS (Arch Linux)☆11May 4, 2024Updated last year
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- testing https://github.com/radicle-dev/radicle-contracts☆14Feb 18, 2021Updated 4 years ago